squashfs: SQUASHFS error: unable to read fragment index table IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready ================================================================================ UBSAN: Undefined behaviour in ./include/net/sch_generic.h:1051:7 shift exponent 129 is too large for 32-bit type 'int' CPU: 0 PID: 13329 Comm: syz-executor.3 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 ubsan_epilogue+0xe/0x3a lib/ubsan.c:161 IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 lib/ubsan.c:422 IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready qdisc_l2t include/net/sch_generic.h:1051 [inline] cbq_update net/sched/sch_cbq.c:567 [inline] cbq_dequeue.cold+0x189/0x18e net/sched/sch_cbq.c:814 dequeue_skb net/sched/sch_generic.c:282 [inline] qdisc_restart net/sched/sch_generic.c:385 [inline] __qdisc_run+0x1b9/0x1680 net/sched/sch_generic.c:403 qdisc_run include/net/pkt_sched.h:120 [inline] net_tx_action+0x51e/0xce0 net/core/dev.c:4592 __do_softirq+0x27d/0xad2 kernel/softirq.c:292 do_softirq_own_stack+0x2a/0x40 arch/x86/entry/entry_64.S:1092 do_softirq.part.0+0x168/0x200 kernel/softirq.c:336 do_softirq kernel/softirq.c:328 [inline] __local_bh_enable_ip+0x22d/0x2a0 kernel/softirq.c:189 local_bh_enable include/linux/bottom_half.h:32 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:721 [inline] ip_finish_output2+0xe53/0x16b0 net/ipv4/ip_output.c:232 ip_finish_output+0x88e/0xd80 net/ipv4/ip_output.c:318 NF_HOOK_COND include/linux/netfilter.h:278 [inline] ip_output+0x203/0x650 net/ipv4/ip_output.c:406 dst_output include/net/dst.h:455 [inline] ip_local_out+0xaf/0x170 net/ipv4/ip_output.c:125 ip_send_skb+0x3e/0xe0 net/ipv4/ip_output.c:1447 udp_send_skb+0x72a/0x1240 net/ipv4/udp.c:848 udp_sendmsg+0x1cdb/0x2590 net/ipv4/udp.c:1135 inet_sendmsg+0x174/0x640 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xc7/0x130 net/socket.c:632 ___sys_sendmsg+0x3b3/0x8f0 net/socket.c:2115 __sys_sendmmsg+0x195/0x470 net/socket.c:2210 __do_sys_sendmmsg net/socket.c:2239 [inline] __se_sys_sendmmsg net/socket.c:2236 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2236 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f1b60797c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 RDX: 0400000000000075 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 000000000118bf68 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c R13: 00007ffed09dd9df R14: 00007f1b607989c0 R15: 000000000118bf2c ================================================================================ squashfs: SQUASHFS error: unable to read fragment index table squashfs: SQUASHFS error: unable to read fragment index table squashfs: SQUASHFS error: unable to read fragment index table squashfs: SQUASHFS error: unable to read fragment index table squashfs: SQUASHFS error: unable to read fragment index table squashfs: SQUASHFS error: unable to read fragment index table SQUASHFS error: squashfs_read_data failed to read block 0x0 squashfs: SQUASHFS error: unable to read squashfs_super_block SQUASHFS error: squashfs_read_data failed to read block 0x0 squashfs: SQUASHFS error: unable to read squashfs_super_block SQUASHFS error: squashfs_read_data failed to read block 0x0 squashfs: SQUASHFS error: unable to read squashfs_super_block squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=15 sclass=netlink_xfrm_socket pid=13871 comm=syz-executor.1 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop4 squashfs: SQUASHFS error: unable to read xattr id index table FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 squashfs: SQUASHFS error: unable to read xattr id index table CPU: 0 PID: 14138 Comm: syz-executor.3 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 __should_failslab+0x153/0x1b6 mm/failslab.c:32 should_failslab+0x5/0xf mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node+0x245/0x4d0 mm/slab.c:3647 __alloc_skb+0x71/0x580 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:995 [inline] alloc_skb_with_frags+0x93/0x5d0 net/core/skbuff.c:5303 sock_alloc_send_pskb+0x6e6/0x840 net/core/sock.c:2090 __ip_append_data+0x1354/0x24e0 net/ipv4/ip_output.c:984 ip_make_skb+0x226/0x2a0 net/ipv4/ip_output.c:1513 udp_sendmsg+0x1c9b/0x2590 net/ipv4/udp.c:1130 inet_sendmsg+0x174/0x640 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xc7/0x130 net/socket.c:632 ___sys_sendmsg+0x3b3/0x8f0 net/socket.c:2115 __sys_sendmmsg+0x195/0x470 net/socket.c:2210 __do_sys_sendmmsg net/socket.c:2239 [inline] __se_sys_sendmmsg net/socket.c:2236 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2236 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f1b60797c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 RDX: 0400000000000075 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 00007f1b60797ca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffed09dd9df R14: 00007f1b607989c0 R15: 000000000118bf2c FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 14188 Comm: syz-executor.3 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 __should_failslab+0x153/0x1b6 mm/failslab.c:32 should_failslab+0x5/0xf mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node_trace+0x244/0x4d0 mm/slab.c:3666 __do_kmalloc_node mm/slab.c:3688 [inline] __kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3703 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0xae/0x580 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:995 [inline] alloc_skb_with_frags+0x93/0x5d0 net/core/skbuff.c:5303 sock_alloc_send_pskb+0x6e6/0x840 net/core/sock.c:2090 __ip_append_data+0x1354/0x24e0 net/ipv4/ip_output.c:984 ip_make_skb+0x226/0x2a0 net/ipv4/ip_output.c:1513 udp_sendmsg+0x1c9b/0x2590 net/ipv4/udp.c:1130 squashfs: SQUASHFS error: unable to read xattr id index table inet_sendmsg+0x174/0x640 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xc7/0x130 net/socket.c:632 ___sys_sendmsg+0x3b3/0x8f0 net/socket.c:2115 __sys_sendmmsg+0x195/0x470 net/socket.c:2210 __do_sys_sendmmsg net/socket.c:2239 [inline] __se_sys_sendmmsg net/socket.c:2236 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2236 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f1b60797c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 RDX: 0400000000000075 RSI: 0000000020007fc0 RDI: 0000000000000003 RBP: 00007f1b60797ca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffed09dd9df R14: 00007f1b607989c0 R15: 000000000118bf2c FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 14219 Comm: syz-executor.3 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0x2f lib/fault-inject.c:149 __should_failslab+0x153/0x1b6 mm/failslab.c:32 should_failslab+0x5/0xf mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x43/0x490 mm/slab.c:3557 __nf_conntrack_alloc+0xda/0x600 net/netfilter/nf_conntrack_core.c:1343 init_conntrack+0xf25/0x12f0 net/netfilter/nf_conntrack_core.c:1423 resolve_normal_ct net/netfilter/nf_conntrack_core.c:1527 [inline] nf_conntrack_in+0x931/0xe20 net/netfilter/nf_conntrack_core.c:1605 ipv4_conntrack_local+0x1b2/0x250 net/netfilter/nf_conntrack_proto.c:480 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xc5/0x1e0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] __ip_local_out+0x475/0x860 net/ipv4/ip_output.c:114 ip_local_out+0x26/0x170 net/ipv4/ip_output.c:123 ip_send_skb+0x3e/0xe0 net/ipv4/ip_output.c:1447 udp_send_skb+0x72a/0x1240 net/ipv4/udp.c:848 udp_sendmsg+0x1cdb/0x2590 net/ipv4/udp.c:1135 squashfs: SQUASHFS error: unable to read xattr id index table inet_sendmsg+0x174/0x640 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xc7/0x130 net/socket.c:632 ___sys_sendmsg+0x3b3/0x8f0 net/socket.c:2115 __sys_sendmmsg+0x195/0x470 net/socket.c:2210 __do_sys_sendmmsg net/socket.c:2239 [inline] __se_sys_sendmmsg net/socket.c:2236 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2236 do_syscall_64+0xf9/0x670 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45de59 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f1b60797c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000027f00 RCX: 000000000045de59 RDX: 0400000000000075 RSI: 0000000020007fc0 RDI: 0000000000000003